Analysis
-
max time kernel
106s -
max time network
67s -
platform
windows7_x64 -
resource
win7 -
submitted
17/07/2020, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
DOC.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
DOC.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
DOC.exe
-
Size
766KB
-
MD5
c7685d6c04940a9a9bdce7645ad5121d
-
SHA1
352ad790c8582959f43c453d4918f02a0333afdc
-
SHA256
0c39b4af77c7279bf8a36e9e337f0ca1af96ca31c1fda5599c5dc8183118e54c
-
SHA512
71ddb906085282566d41c2527a721013349e4c7df6cfd676584c03702c789d9313dcb1363679af78ce57123129491bb657c9c60c34cda262fe0ff4d05140ea61
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.aquariuslogistics.com - Port:
587 - Username:
[email protected] - Password:
AQL@2019#$
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1824-4-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla behavioral1/memory/1824-5-0x00000000004472EE-mapping.dmp family_agenttesla behavioral1/memory/1824-6-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla behavioral1/memory/1824-7-0x0000000000400000-0x0000000000474000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\sLbGMVN = "C:\\Users\\Admin\\AppData\\Roaming\\sLbGMVN\\sLbGMVN.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1100 set thread context of 1824 1100 DOC.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1788 schtasks.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1904 REG.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1100 DOC.exe 1100 DOC.exe 1100 DOC.exe 1824 RegSvcs.exe 1824 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1100 DOC.exe Token: SeDebugPrivilege 1824 RegSvcs.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1788 1100 DOC.exe 26 PID 1100 wrote to memory of 1788 1100 DOC.exe 26 PID 1100 wrote to memory of 1788 1100 DOC.exe 26 PID 1100 wrote to memory of 1788 1100 DOC.exe 26 PID 1100 wrote to memory of 1836 1100 DOC.exe 28 PID 1100 wrote to memory of 1836 1100 DOC.exe 28 PID 1100 wrote to memory of 1836 1100 DOC.exe 28 PID 1100 wrote to memory of 1836 1100 DOC.exe 28 PID 1100 wrote to memory of 1836 1100 DOC.exe 28 PID 1100 wrote to memory of 1836 1100 DOC.exe 28 PID 1100 wrote to memory of 1836 1100 DOC.exe 28 PID 1100 wrote to memory of 1824 1100 DOC.exe 29 PID 1100 wrote to memory of 1824 1100 DOC.exe 29 PID 1100 wrote to memory of 1824 1100 DOC.exe 29 PID 1100 wrote to memory of 1824 1100 DOC.exe 29 PID 1100 wrote to memory of 1824 1100 DOC.exe 29 PID 1100 wrote to memory of 1824 1100 DOC.exe 29 PID 1100 wrote to memory of 1824 1100 DOC.exe 29 PID 1100 wrote to memory of 1824 1100 DOC.exe 29 PID 1100 wrote to memory of 1824 1100 DOC.exe 29 PID 1100 wrote to memory of 1824 1100 DOC.exe 29 PID 1100 wrote to memory of 1824 1100 DOC.exe 29 PID 1100 wrote to memory of 1824 1100 DOC.exe 29 PID 1824 wrote to memory of 1904 1824 RegSvcs.exe 31 PID 1824 wrote to memory of 1904 1824 RegSvcs.exe 31 PID 1824 wrote to memory of 1904 1824 RegSvcs.exe 31 PID 1824 wrote to memory of 1904 1824 RegSvcs.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\DOC.exe"C:\Users\Admin\AppData\Local\Temp\DOC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vTIClpBZBl" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF758.tmp"2⤵
- Creates scheduled task(s)
PID:1788
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵PID:1836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:1904
-
-